SlideShare una empresa de Scribd logo
1 de 23
Introduction to Cyber
Law
Intellectual Property Rights
Unit-6
Professor & Lawyer P. Guru Prasad
M.B.A., M.Com., M.Phil., PGDFTM., APSET.,
PhD at JNTUK
World Wide Web
Invented By : Tim Berners-
Lee
 Is a system of
interlinked hypertext documents
 Accessed via the Internet with
a web browser
 Web pages contain text,
images, videos, and
other multimedia.
Internet
 The Internet is a
global system of
interconnected
computer networks.
 Its access is provided
by ISPs.
 It runs applications
like www, ftp, html etc
World Wide Web
 Web is collection of
text documents and
other resources,
linked by hyperlinks
and URLs
 Usually accessed
by web browsers
 Its an application
running on Internet
IT ACT PROVISIONS
 email would now be a valid and legal form
of communication in our country that can be
duly produced and approved in a court of
law.
 Companies shall now be able to carry out
electronic commerce using the legal
infrastructure provided by the Act.
 Digital signatures have been given legal
validity and sanction in the Act.
IT ACT PROVISIONS
 The Act now allows Government to
issue notification on the web thus
heralding e-governance
 statutory remedy in case if anyone
breaks into companies computer
systems or network and causes
damages or copies data
CYBER CRIMES
 CYBER CRIMES AGAINST
PERSONS
eg ‘melissa’and ‘lovebug’
virus
 CYBER CRIMES AGAINST
PROPERTY
eg computer vandalism
 CYBER CRIMES AGAINST
GOVERNMENT
 eg ‘Al-Qaeda’
Cyber Squatting
 Cyber squatting is a type of crime
where in the hackers register sells and
uses domain name of some company
with the aim of gaining profit from the
goodwill of its trademark.
 It is the practice of buying the Domain
Names of popular business names
with the intention of selling it to the
actual owner to earn profit.
The salient features of IT
Act,2000
 Sec 65- Tampering with computer source
document.
 Sec 66- Computer related offences
 Sec 67- Punishment for Publishing or transmitting
Obscene Material in Electronic form.
 Sec 71- Penalty for Misrepresentation
 Sec 72- Penalty for Breach of confidentiality and
Privacy
 Sec 73- Penalty for publishing Digital
signature Certificate False in certain particulars
 Sec 74- Publications for Fraudulent Purpose
Cyber crime and E-commerce
 A cyber crime can defined as a criminal
activity doing using computer. They make
use of computer technology in order to steal
the personal information of the user,
business secrets for the malicious purpose.
 Cyber space
 Cyber squatting
 Cyber punk
 Cyber warfare
 Cyber Terrorism
Various Cyber Crimes
 Cyber crime against Persons
 Cyber crime against Property
 Cyber crime against Organizations
 Cyber crime against Society
 Cyber crime against user group.
 Apart from this, they also perform other
criminal activities, like child pornography,
credit card frauds, cyber stalking,
defaming, ignoring copy right and
software licensing.
 Connectivity via the Internet has greatly
abridged geographical distances and made
communication even more rapid. While
activities in this limitless new universe are
increasing incessantly, the need for laws to be
formulated to govern all spheres of this new
revolution was felt.
 In order to keep pace with the changing
generation the Indian Parliament passed
Information Technology (IT) Act, 2000. The IT
Act has been conceptualized on the United
Nations Commission on International Trade
Law (UNCITRAL) Model Law
INFORMATION
TECHNOLOGY ACT,2000
 The Act aims at providing legal
recognition for transactions carried out
by means of electronic data interchange
and other means of electronic
communications commonly referred to
as "electronic commerce"
 which involve the use of alternative to
paper based methods of communication
and storage of information and aims at
facilitating electronic filing of documents
with the government agencies.
INFORMATION TECHNOLOGY
ACT,2000
Information Technology
Act,2000 in a capsule
 Called the Information Technology
Act, 2000.
 Came into force in June,2000
 Extends to whole of India and also
to people who contravene the
provisions of the act outside India.
 Shall come into force as per
notification by the Central govt.
 The Act applies to the whole of India.
It also applies to any offence
committed outside India by any
person.
 It does not apply to the following.
 a negotiable instrument as defined in
section 13 of the Negotiable
Instruments Act, 1881;
 a power-of-attorney as defined in
section 1A of the Power-of-attorney
Information Technology Act,2000 in a
capsule
DIGITAL SIGNATURES:
LEGITIMACY AND USE
 The Act has adopted the Public Key
Infrastructure (PKI) for securing
electronic transactions. A digital
signature means an authentication of
any electronic record by a subscriber
by means of an electronic method or
procedure in accordance with the
other provisions of the Act.
 Thus a subscriber can authenticate an
electronic record by affixing his digital
signature.
 A private key is used to create a digital
signature whereas a public key is used
to verify the digital signature and
electronic record.
 They both are unique for each
subscriber and together form a
functioning key pair.
DIGITAL SIGNATURES:
LEGITIMACY AND USE
 Further, the Act provides that when any
information or other matter needs to be
authenticated by the signature of a
person, the same can be authenticated
by means of the digital signature affixed
in a manner prescribed by the Central
Government.
 The Act also gives the Central
Government powers:
 a) to make rules prescribing the digital
signature
DIGITAL SIGNATURES:
LEGITIMACY AND USE
b) the manner in which it shall be
affixed
c) the procedure to identify the person
affixing the signature
d) the maintenance of integrity, security
and confidentiality of records or
e) payments and rules regarding any
other appropriate matters
DIGITAL SIGNATURES:
LEGITIMACY AND USE
 These signatures are to be
authenticated by Certifying Authorities
(CAs) appointed under the Act. These
authorities would inter alia, have the
license to issue Digital Signature
Certificates (DSCs).
 The applicant must have a private key
that can create a digital signature. This
private key and the public key listed on
the DSC must form the functioning key
DIGITAL SIGNATURES:
LEGITIMACY AND USE
 Once the subscriber has accepted
the DSC, he shall generate the key
pair by applying the security
procedure.
 Every subscriber is under an
obligation to exercise reasonable
care and caution to retain control of
the private key corresponding to the
public key listed in his DSC.
DIGITAL SIGNATURES:
LEGITIMACY AND USE
List of Organizations that control
Internet
 ISOC
 IETF
 IAB
 IANA
 IRTF
 IESG
 IEEE
 W3C
Introduction to cyber law.

Más contenido relacionado

La actualidad más candente

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 

La actualidad más candente (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
cyber crime
cyber crimecyber crime
cyber crime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Similar a Introduction to cyber law.

It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
Yogendra Wagh
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
Aditya Shukla
 

Similar a Introduction to cyber law. (20)

Information technology act
Information technology actInformation technology act
Information technology act
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Cyber
CyberCyber
Cyber
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Law and Cyber Crime
Cyber Law and Cyber Crime Cyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Assignment edu 03
Assignment edu 03 Assignment edu 03
Assignment edu 03
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 

Más de PROF. PUTTU GURU PRASAD

Más de PROF. PUTTU GURU PRASAD (20)

Jagat Seth family.pdf
Jagat Seth family.pdfJagat Seth family.pdf
Jagat Seth family.pdf
 
3 Filter Test pgp.ppt
3 Filter Test pgp.ppt3 Filter Test pgp.ppt
3 Filter Test pgp.ppt
 
Bills-of-Exchange.pptx
Bills-of-Exchange.pptxBills-of-Exchange.pptx
Bills-of-Exchange.pptx
 
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdfJAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
JAMES HADLEY CHASE the-flesh-of-the-orchid.pdf
 
JAGAT SETH (WORLD BANKER).pptx
JAGAT SETH (WORLD BANKER).pptxJAGAT SETH (WORLD BANKER).pptx
JAGAT SETH (WORLD BANKER).pptx
 
Comparative analysis of blue origin, virgin galactic with space x
Comparative analysis of blue origin, virgin galactic with space xComparative analysis of blue origin, virgin galactic with space x
Comparative analysis of blue origin, virgin galactic with space x
 
Informal communication pgp viva vvit
Informal communication pgp viva vvitInformal communication pgp viva vvit
Informal communication pgp viva vvit
 
Improving communication effectiveness PGP VIVA VVIT
Improving communication effectiveness PGP VIVA VVITImproving communication effectiveness PGP VIVA VVIT
Improving communication effectiveness PGP VIVA VVIT
 
Importance of communicaton pgp
Importance of communicaton pgpImportance of communicaton pgp
Importance of communicaton pgp
 
Communication pgp VIVA VVIT
Communication pgp VIVA VVITCommunication pgp VIVA VVIT
Communication pgp VIVA VVIT
 
Formal communication pgp VIVA VVIT
Formal communication pgp VIVA VVITFormal communication pgp VIVA VVIT
Formal communication pgp VIVA VVIT
 
Barriers to communication pgp VIVA VVIT
Barriers to communication pgp VIVA VVITBarriers to communication pgp VIVA VVIT
Barriers to communication pgp VIVA VVIT
 
Partnership firm pgp VIVA VVIT
Partnership firm pgp VIVA VVITPartnership firm pgp VIVA VVIT
Partnership firm pgp VIVA VVIT
 
Communication pgp VIVA VVIT
Communication pgp VIVA VVITCommunication pgp VIVA VVIT
Communication pgp VIVA VVIT
 
Merits and Demerits of Partnership firm pgp VIVA VVIT
Merits and Demerits of Partnership firm pgp VIVA VVITMerits and Demerits of Partnership firm pgp VIVA VVIT
Merits and Demerits of Partnership firm pgp VIVA VVIT
 
Joint Hindu Family Business
Joint Hindu Family BusinessJoint Hindu Family Business
Joint Hindu Family Business
 
Elements of Directing PGP viva VVIT
Elements of Directing  PGP viva VVITElements of Directing  PGP viva VVIT
Elements of Directing PGP viva VVIT
 
Leadership PGP VIVA VVIT
Leadership PGP VIVA VVITLeadership PGP VIVA VVIT
Leadership PGP VIVA VVIT
 
Leadership qualities PGP VIVA VVIT
Leadership qualities PGP VIVA VVIT Leadership qualities PGP VIVA VVIT
Leadership qualities PGP VIVA VVIT
 
Sole proprietorship 1
Sole proprietorship 1Sole proprietorship 1
Sole proprietorship 1
 

Último

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 

Último (20)

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 

Introduction to cyber law.

  • 1. Introduction to Cyber Law Intellectual Property Rights Unit-6 Professor & Lawyer P. Guru Prasad M.B.A., M.Com., M.Phil., PGDFTM., APSET., PhD at JNTUK
  • 2. World Wide Web Invented By : Tim Berners- Lee
  • 3.  Is a system of interlinked hypertext documents  Accessed via the Internet with a web browser  Web pages contain text, images, videos, and other multimedia.
  • 4. Internet  The Internet is a global system of interconnected computer networks.  Its access is provided by ISPs.  It runs applications like www, ftp, html etc World Wide Web  Web is collection of text documents and other resources, linked by hyperlinks and URLs  Usually accessed by web browsers  Its an application running on Internet
  • 5. IT ACT PROVISIONS  email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law.  Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.  Digital signatures have been given legal validity and sanction in the Act.
  • 6. IT ACT PROVISIONS  The Act now allows Government to issue notification on the web thus heralding e-governance  statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data
  • 7. CYBER CRIMES  CYBER CRIMES AGAINST PERSONS eg ‘melissa’and ‘lovebug’ virus  CYBER CRIMES AGAINST PROPERTY eg computer vandalism  CYBER CRIMES AGAINST GOVERNMENT  eg ‘Al-Qaeda’
  • 8. Cyber Squatting  Cyber squatting is a type of crime where in the hackers register sells and uses domain name of some company with the aim of gaining profit from the goodwill of its trademark.  It is the practice of buying the Domain Names of popular business names with the intention of selling it to the actual owner to earn profit.
  • 9. The salient features of IT Act,2000  Sec 65- Tampering with computer source document.  Sec 66- Computer related offences  Sec 67- Punishment for Publishing or transmitting Obscene Material in Electronic form.  Sec 71- Penalty for Misrepresentation  Sec 72- Penalty for Breach of confidentiality and Privacy  Sec 73- Penalty for publishing Digital signature Certificate False in certain particulars  Sec 74- Publications for Fraudulent Purpose
  • 10. Cyber crime and E-commerce  A cyber crime can defined as a criminal activity doing using computer. They make use of computer technology in order to steal the personal information of the user, business secrets for the malicious purpose.  Cyber space  Cyber squatting  Cyber punk  Cyber warfare  Cyber Terrorism
  • 11. Various Cyber Crimes  Cyber crime against Persons  Cyber crime against Property  Cyber crime against Organizations  Cyber crime against Society  Cyber crime against user group.  Apart from this, they also perform other criminal activities, like child pornography, credit card frauds, cyber stalking, defaming, ignoring copy right and software licensing.
  • 12.  Connectivity via the Internet has greatly abridged geographical distances and made communication even more rapid. While activities in this limitless new universe are increasing incessantly, the need for laws to be formulated to govern all spheres of this new revolution was felt.  In order to keep pace with the changing generation the Indian Parliament passed Information Technology (IT) Act, 2000. The IT Act has been conceptualized on the United Nations Commission on International Trade Law (UNCITRAL) Model Law INFORMATION TECHNOLOGY ACT,2000
  • 13.  The Act aims at providing legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communications commonly referred to as "electronic commerce"  which involve the use of alternative to paper based methods of communication and storage of information and aims at facilitating electronic filing of documents with the government agencies. INFORMATION TECHNOLOGY ACT,2000
  • 14. Information Technology Act,2000 in a capsule  Called the Information Technology Act, 2000.  Came into force in June,2000  Extends to whole of India and also to people who contravene the provisions of the act outside India.  Shall come into force as per notification by the Central govt.
  • 15.  The Act applies to the whole of India. It also applies to any offence committed outside India by any person.  It does not apply to the following.  a negotiable instrument as defined in section 13 of the Negotiable Instruments Act, 1881;  a power-of-attorney as defined in section 1A of the Power-of-attorney Information Technology Act,2000 in a capsule
  • 16. DIGITAL SIGNATURES: LEGITIMACY AND USE  The Act has adopted the Public Key Infrastructure (PKI) for securing electronic transactions. A digital signature means an authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the other provisions of the Act.
  • 17.  Thus a subscriber can authenticate an electronic record by affixing his digital signature.  A private key is used to create a digital signature whereas a public key is used to verify the digital signature and electronic record.  They both are unique for each subscriber and together form a functioning key pair. DIGITAL SIGNATURES: LEGITIMACY AND USE
  • 18.  Further, the Act provides that when any information or other matter needs to be authenticated by the signature of a person, the same can be authenticated by means of the digital signature affixed in a manner prescribed by the Central Government.  The Act also gives the Central Government powers:  a) to make rules prescribing the digital signature DIGITAL SIGNATURES: LEGITIMACY AND USE
  • 19. b) the manner in which it shall be affixed c) the procedure to identify the person affixing the signature d) the maintenance of integrity, security and confidentiality of records or e) payments and rules regarding any other appropriate matters DIGITAL SIGNATURES: LEGITIMACY AND USE
  • 20.  These signatures are to be authenticated by Certifying Authorities (CAs) appointed under the Act. These authorities would inter alia, have the license to issue Digital Signature Certificates (DSCs).  The applicant must have a private key that can create a digital signature. This private key and the public key listed on the DSC must form the functioning key DIGITAL SIGNATURES: LEGITIMACY AND USE
  • 21.  Once the subscriber has accepted the DSC, he shall generate the key pair by applying the security procedure.  Every subscriber is under an obligation to exercise reasonable care and caution to retain control of the private key corresponding to the public key listed in his DSC. DIGITAL SIGNATURES: LEGITIMACY AND USE
  • 22. List of Organizations that control Internet  ISOC  IETF  IAB  IANA  IRTF  IESG  IEEE  W3C